You are on page 1of 4

F5-Networks

101
Application Delivery Fundamentals

http://killexams.com/exam-detail/101
Question: 391

Which two statements are true concerning capabilities of current BIG-IP platforms? (Choose two.)
A. The 1600 hosts more ports than the 3900.
B. All current BIG-IP platform use both an ASIC. And CPU(s)to process traffic.
C. All current BIG-IP platform can perform hardware compression.
D. Only 2U BIG-IP Platform have an option of a second power supply.
E. All BIG-IP have capacity to perform bulk encryption I decryption of SSL traffic independent of the CPU.

Answer: B,E

Question: 392

Assume a client’s traffic is being processed only by a NAT; no SNAT or virtual server processing takes place. Also assume that the NAT
definition specifies a NAT address and an origin address while all other settings are left at their defaults. If the origin server were to initiate
traffic via the BIG-IP, what changes, if any, would take place when the BIG-IP processes such packets?
A. The BIG-IP would drop the request since the traffic didn’t arrive destined to the NAT address.
B. The source address would not change, but the destination address would be changed to the NAT address.
C. The source address would be changed to the NAT address and destination address would be left unchanged.
D. The source address would not change, but the destination address would be changed to a self-IP of the BIG-IP.

Answer: C

Question: 393
Which event is always triggered when a client initially connects to a virtual server configured with an HTTP profile?
A. HTTP_DATA
B. CLIENT_DATA
C. HTTP_REQUEST
D. CLIENT.ACCEPTED

Answer: D

Question: 394

A site has six members in a pool. Three of the servers are new and have more memory and a faster processor than the others. Assuming all
other factors are equal and traffic should be sent to all members, which two load balancing methods are most appropriate? (Choose two.)
A. Ratio
B. Priority
C. Observed
D. Round Robin

Answer: A,C

Question: 395

Which file contains the list of events for which the GTM System will send traps to an SNMP manager?
A. /etc/snmpd.conf
B. /etc/syslogng.conf
C. /etc/alertd/alert.conf
D. /etc/gtm_snmptrap.conf

Answer: C

Question: 396

Which of the following business benefits does storage tearing offer to customers?
A. Reduces time for backups because data on the secondary tier can have a less time intensive backup policed applied to it.
B. All of the above.
C. Enables customers to apply a more aggressive RTO/RPO for business critical Tier-1 unstructured data.
D. Reduces money spent on storage since the majority of data can be moved to less expensive secondary tier storage.

Answer: B
Question: 397
The ARX can see__________when a data modification takes place and will cue that file to be migrated back to the primary tier.
A. In real time
B. Nightly
C. Weekly
D. At the time of a system scan
E. When scheduled by administrator

Answer: A

Question: 398

Which WOM feature replaces a long byte pattern, such as "100000111000110101", with a shorter reference to the pattern?
A. Symmetric adaptive compression
B. Symmetric data deduplication
C. Bandwidth allocation
D. Application protocol acceleration
E. TCP optimization

Answer: B

Question: 399
A web client accesses a web application using what protocol?
A. TCP
B. XML
C. HTML
D. HTTP

Answer: D

Question: 400

What is the main business driver for bringing Enterprise Manager into the network infrastructure?
A. Consolidate management of administrator and user accounts
B. Consolidate management of licenses
C. Consolidate management of SSL certificates
D. Consolidate management of BIG-IP devices
E. Consolidate management of access policies

Answer: D
For More exams visit https://killexams.com/vendors-exam-list

Kill your exam at First Attempt....Guaranteed!

You might also like